Threat Hunter/Threat Detection/SOC Analyst/TTP/Threats/Monitoring/Detection/ZTNA
Posted 2 weeks ago by Sentinel
£600 Per day
Inside
Hybrid
London, UK
Summary: The role of Threat Hunter/SOC Analyst involves proactive threat detection and hunting within a busy SOC team, focusing on cloud environments such as AWS, Azure, and GCP. The position requires strategic thinking to anticipate and mitigate threats before they occur. It is a hybrid role based in London, classified as inside IR35. The candidate will utilize tools like Sentinel and Splunk for monitoring and detection.
Key Responsibilities:
- Conduct threat detection and hunting activities within a SOC team.
- Utilize cloud platforms (AWS, Azure, GCP) for monitoring threats.
- Develop strategies for proactive threat management.
- Provide insights and direction on threat mitigation.
Key Skills:
- Experience with SOC operations and threat monitoring.
- Proficiency in tools such as Sentinel and Splunk.
- Strong understanding of cloud environments (AWS, Azure, GCP).
- Ability to think strategically about threat management.
Salary (Rate): £600 per day
City: London
Country: UK
Working Arrangements: hybrid
IR35 Status: inside IR35
Seniority Level: undetermined
Industry: IT
Threat Hunter/Threat Detector/SOC Analyst/TTP/Threats/Monitoring/Detection/ZTNA/Sentinel/Splunk. Superb London based client have an Urgent role, Inside IR35, Hybrid Remote and Onsite for an experienced SOC Analyst/TTP/Threats Monitoring/Detection/ZTNA/Sentinel/Splunk.
This role, working across Cloud (AWS/Azure and GCP) will see you focusing on threat detection and threat hunting as part of a busy SOC Team. This role isn't about dealing with threats when they happen, it is about hunting them out. Thinking ahead of the curve and providing direction, thoughts and strategy as to how the business deals with threats.